Security

We have put in place stringent monitors and controls to ensure the delivery of the highest standard of security as per our commitments. We understand that the biggest nightmare for any company is data breach, and therefore, we follow the best practice framework with latest and modern infrastructure to make sure that our client’s data is safe.

We have divided our security in to three layers of security and few of our security policy pointers have been enumerated below:

Work Station & Network Security

  • Access to workstations is restricted through Network, windows login, PC locking.
  • No access is available for fixing any external drive (CD Drives, Floppy Drives, and USB Ports) to the workstation.
  • Workstations secured individually by Anti-Virus and Fortinet Firewall Protection.
  • Limited internet access on need-basis – Need Based ( client specific) emails access only
  • Individual domain accounts for each processor ensures that the access to source documents is restricted to authorized employees only.
  • Segmented LAN with firewall protection.
  • Static IP Based Data Transfer Facility via SSL Protected FTP Servers based in the US.
  • Own a Dedicated VPS server for secured Data Transfer.
  • The appropriate backup mechanism is in place to prevent data loss.
  • Weekly update of the anti-virus pattern on every system.
  • ISO 9001 and ISO 27001 Certified Facility.

Physical Security

  • Biometric entry to the premises is restricted through finger punch in.
  • The Facility surveillance is done by CCTV.
  • Facility also manned with Security Staff.
  • Fire security and alarm system consisting of smoke and heat detectors, sensors. Fire-fighting equipment is also installed.

Employee Credibility

  • Employee recruitment after thorough background checks.
  • Employee sign non-disclosure agreement before being inducted into the company.
  • Core information shared only within a limited group of people.
  • Restricted access to internet websites through robust firewall mechanism and the same is allowed only if it is a process requirement.